Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceAccess ManagementIdentity ManagementPhysical SecurityVideo Surveillance

Making the Security Case to the C-Suite

By Greg Schreiber
Boon Edam Circlelock Security Portal with Internal Biometrics.jpg
May 27, 2020

Perhaps the most significant security advancement made at the enterprise level over the last two decades has not been technology, but rather its perception. While shiny new technology devices never fail to grab the attention of management, making the security case for purchasing them is another matter. Now that the security function is considered a key aspect of business operations in many organizations, it becomes critical to keep the C-Suite engaged.

As this current COVID-19 pandemic has illustrated, organizations that fail to properly gauge potential threats and risks to their operations can quickly fall into the abyss. Having a risk plan that challenges C-Suite executives to look beyond the technology aspects of security to a proactive situational awareness posture is a big step forward. When management reinforces and supports such proactive steps to employees and staff, it strengthens that organization and helps it to be flexible while meeting any challenge.

Make the Business Case

But how is that proactive posture achieved?

Any security program that has managed to embed its value into the organizational infrastructure has done so with a robust program of awareness and transparency. While it is a constant battle to foster a higher awareness of the real need for additional technology and security products, providing the C-Suite a transparent argument for systems expansion and additional capital spending can be difficult. Selling risk is hard.

Security directors who assume that focusing on technology in their relations with other business units and using fear tactics to try to force compliance are missing a big opportunity to convince the C-suite of security's importance. The C-Suite will recognize a security team as relevant if it is adept at managing risks to revenue streams, operations and the brand.

Although many successful security executives may have helped C-level executives move past the lament of security being nothing more than a cost center, they should continue to stress actual returns-on-investments when it comes to technology. As one global CTO, Rudy Wolter, said to me, “Senior management understands the numbers. They may not connect numbers to risk, and that is up to you to show. You have to prove ‘risk versus reward’; if they do not see the risk – and it has to be real – the C-suite will believe you are overstating the facts and you lose credibility.”

Here’s an example of describing the ROI to the C-Suite: once an intruder gets into a facility via tailgating there’s a whole world of risk and liability that opens up, ranging from theft to violence, as well as bad PR, lawsuits and regulatory fines. Security entrances can mitigate that risk of intrusion by dealing with tailgating from a deter, detect or prevent standpoint…in the end reducing the manpower needed to supervise the entry, creating a payback on the capital expenditure. These very specific features and benefits can communicate the ROI story to upper management.

Another approach to influencing the C-Suite is proposed by Paul Schuster, Senior Corporal/Project Officer, Facilities Management at the Dallas Police Department: start at the bottom and work the culture. “By making sure all employees are educated about security, you make them a part of the solution. You can expand beyond basic training to help them understand the need to limit the organization’s liability, as well as the reasoning behind implementing the technology for security layers including cameras, guards and security entrances. This will improve their engagement and increase the success of adoption. When your staff has a better understanding of these needs, the awareness will filter up through executive management to the C-Suite as well.”

The cold truth is that most C-Suite executives are not concerned about the technical profile of that new biometric reader or camera system. Management must understand the risk mitigation case of that device and how security promotes the organization’s bottom line and corporate culture. That is why it is key that security leaders understand and emphasize when new technology is low-stress and does not unduly impact staff routines. When communicating with the C-Suite, security must communicate both the costs and the benefits at the organizational level to build support.

KEYWORDS: c-suite COVID-19 pandemic risk management security equipment security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Greg schreiber
Greg Schreiber is the Senior Vice President of Sales at Boon Edam Inc. with a career that spans more than 20 years in the security entrance and door industry in a variety of sales management roles, including National Sales Manager for Boon Edam since 2007. Schreiber has successfully steered Boon Edam’s North American and Latin American sales teams to produce double-digit sales growth in each of the last five years. Image courtesy of Schreiber

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Overhead view of warehouse

    Layered Secure Entrances Strengthen Warehouse and Supply Chain Security

    See More
  • active-directory-freepik5567.jpg

    How to convince the C-suite to buy in to active directory security

    See More
  • Regulatory Changes Top C-Suites’ List of Enterprise Risks for 2017

    Selling Security to the C-suite

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing